put together these questions in any other case be prepared to fail ST0-050 exam.
I never notion i might be the usage of braindumps for sober IT tests (i was continually an honors scholar, lol), however as your profession progresses and you hold more duties, which includes your own family, finding time and money to prepare to your tests acquire tougher and tougher. yet, to provide to your own family, you necessity to uphold your profession and information growing... So, perplexed and a bit responsible, I ordered this killexams.com bundle. It lived as much as my expectancies, as I passed the ST0-050 exam with a superbly commandeer marks. The truth is, they conclude provide you with true ST0-050 exam questions and solutions - that is precisely what they promise. but the rectify information likewise is, that this records you cram on your exam stays with you. Dont they complete worship the question and own layout due to that So, some months later, once I acquired a great promoting with even larger duties, I regularly locate myself drawing from the understanding I got from Killexams. So it additionally facilitates in the end, so I dont sustain that guilty anymore.

where can i find slack ST0-050 exam questions?
I necessity to certainly cope with ninety three% marks in the finish of the exam, as numerous questions hold been just infatuation the adviser for me. An entire lot favored to the killexams. I had a weight from status of labor to rupture up the exam ST0-050. However, i was burdened over taking a respectable planning in runt time. At that factor, the killexams.com aide showed up as a windfall for me, with its smooth and short replies.

located an accurate source for actual ST0-050 Questions.
i would clearly recommend killexams.com to each person whos giving ST0-050 exam as this now not just helps to skim up the concepts inside the workbook but additionally gives a fanciful concept about the sample of questions. first rate hearten ..for the ST0-050 exam. thank you a lot killexams.com crew !

Use true ST0-050 dumps with actual and popularity.
I genuinely asked it, honed for per week, then went in and passed the exam with 89% marks. This is the factor that the prerogative exam arrangement ought to be similar to for absolutely everyone! I got to be ST0-050 certified colleague resulting from this web site. They hold an super accumulation of killexams.com and exam arrangement rightty and this time their stuff is precisely as wonderful. The questions are valid, and the exam simulator works top class. No issues recognized. I counseled killexams.com Steadfast!!

i'm very cheerful with ST0-050 solemnize guide.
I would absolutely submit killexams.com to every person whos giving ST0-050 exam as this no longer honestly facilitates to sweep up the principles within the workbook however additionally offers a top notch thought about the pattern of questions. Remarkableassist ..For the ST0-050 exam. Thank you lots killexams.com team !

Take a smart circulate, attain these ST0-050 questions and answers.
The satisfactory IT exam prep i hold ever approach upon. sincerely my ST0-050 exam is in a few days, but I sense so prepared and reassured, especially now that i hold read complete of the efficacious critiques prerogative here. The exam simulator appears to be very beneficial, its immaculate to dont forget questions and answers, plus, in case you maintain going via them time after time, you initiate seeing a larger picture and understand the ideas higher. to this point, i hold had fanciful revel in with Killexams!

first rate possibility to acquire certified ST0-050 examination.
All in all, killexams.com changed into a incredible manner for me to set aside together for this exam. I handed, but hold become a piece disappointed that now complete questions about the exam were a hundred% just infatuation what killexams.com gave me. Over 70% were the identical and the relaxation changed into very comparable - Im not wonderful if this is a grandiose issue. I managed to skip, so I assume this counts as an excellent finish result. However understand that in spite of killexams.com you continue to necessity to test and utilize your brain.

where must I sign in for ST0-050 exam?
Thankyou killexams..I hold cleared my ST0-050 exam with 92%. Your question economic team hold become very beneficial. If complete people practices a hundred% certainly from your question set and research complete the questions rightly, then hes going to definately prevail. Till now i hold cleared three extraordinary tests complete with the hearten of your site. Thanks again.

actual ST0-050 questions! i used to be no longer watching for such ease in examination.
After trying numerous books, i was quite upset not getting the prerogative materials. i was seeking out a tenet for exam ST0-050 with light and rightly-organized questions and answers. killexams.com fulfilled my need, because it defined the tangled topics within the handiest way. inside the actual exam I were given 89%, which changed into beyond my expectation. thank you killexams.com, in your incredible manual-line!

All actual test questions ultra-modern ST0-050 examination! Are you kidding?
The ST0-050 exam is putative to be a completely diffcult exam to lucid but I cleared it ultimate week in my first try. The killexams.com s guided me nicely and i used to be nicely organized. Recommendation to different students - dont win this exam lightly and test thoroughly.

Symantec Symantec Network Access Control

CUPERTINO, CA--(Marketwire - July 17, 2008) - Symantec Corp. (NASDAQ: SYMC) these days announced that Symantec Endpoint insurance policy eleven.0 and Symantec community access manage eleven.0 had been awarded general criteria comparison Assurance plane 2 augmented with ALC_FLR.2 and AVA_MSU.1 (EAL2+) certification. This certification assures clients that Symantec Endpoint insurance route and Symantec network access manage hold undergone a rigorous analysis and checking out technique and conform to standards sanctioned with the aid of the foreign requisites firm. ordinary standards is a vital global assessment usual for safety products as its certifications are recognized in 25 nations around the world.

in response to the fresh certification, Symantec Endpoint protection is conformant to the U.S. government insurance policy Profile for Anti-Virus purposes for Workstations in fundamental Robustness Environments, version 1.1, April 4, 2006. For more counsel about Symantec's regular standards certifications, contend with: http://www.cse-cst.gc.ca/capabilities/standard-standards/depended on-products-e.html.

"This certification additional validates the potential of Symantec Endpoint protection and Symantec community entry manage to give protection to any company," pointed out Brad Kingsbury, senior vp Endpoint safety and administration, Symantec Corp. "Recognizing that the Federal government is a leading proponent of general criteria certification, Symantec is smartly located to continue offering shoppers in the department of defense and civilian federal companies with endpoint coverage technology that meets stringent EAL2+ certification."

Communications safety institution Canada (CSEC) participates within the overseas average standards awareness association (CCRA) on Canada's behalf and sets the requirements for the Canadian certification procedure. Upon a hit completion of the certification system, a product's protection target and Certification record and its certificate of Product contrast are posted on CSEC's internet web site at: http://www.cse-cst.gc.ca/features/usual-criteria/standard-standards-e.html.

About yardstick standards

The commonplace standards for suggestions technology protection comparison (CC) is a group of evaluation standards agreed to by the USA' countrywide safety agency/national Institute of necessities and applied sciences and equivalent their bodies in 24 other nations. It changed into designed to resolve the technical and conceptual adjustments among current requirements for the comparison of safety techniques and items. Certification to the general standards requires in-depth analysis of product design and building methodology, backed via extensive checking out. commonplace criteria is at the second identified by prerogative here nations: united states, Canada, Australia, unusual Zealand, Austria, The Czech Republic, Denmark, Finland, France, Germany, Greece, Hungary, India, Israel, Italy, Japan, Malaysia, The Netherlands, Norway, Republic of Korea, Singapore, Spain, Sweden, Turkey, and the United Kingdom.

The usual standards represents the influence of efforts to strengthen criteria for evaluation of IT safety which are extensively accepted inside the foreign group. extra guidance is purchasable at http://www.commoncriteriaportal.org.

About Symantec

Symantec is a global chief in presenting safety, storage and techniques management options to assist organizations and patrons relaxed and maneuver their assistance. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 international locations. greater suggestions is available at www.symantec.com.

note TO EDITORS: if you would infatuation additional info on Symantec agency and its items, gladden search counsel from the Symantec information elbowroom at http://www.symantec.com/news. complete expenditures cited are in U.S. dollars and are legitimate handiest in the united states.

Symantec and the Symantec logo are logos or registered trademarks of Symantec service provider or its affiliates within the U.S. and different countries. other names could be trademarks of their respective owners.

Symantec and AVG applied sciences hold introduced that their retiring some of their items. AVG will now not present the LiveKive backup provider, whereas Symantec will retire its community access control (NAC) answer.

AVG has determined to discontinue AVG LiveKive on account of the low utilization degree. beginning with April 9, 2014, clients will no longer be in a position to upload unusual info to their accounts. customers can download the information they necessity to hold except July 7, 2014.

day after today, on July 8, complete information could be deleted permanently. The enterprise says no other products or capabilities are littered with the resolution to discontinue LiveKive.

“we hold a few core coverage, efficiency and privateness items that they determine are normally established with their valued clientele. They additionally present some complementary products in other areas for which they admiration no matter if to continue updating on an ongoing basis in keeping with the levels of usage. here's sadly the case with AVG LiveKive,” AVG explained.

LiveKive users hold loads of an identical features to acquire a choice from. The record contains Microsoft’s OneDrive (formerly referred to as SkyDrive), Google power, IDrive, Mozy, Bitcasa and Dropbox.

Symantec, even so, has introduced conclusion-of-existence, conclusion-of-availability and conclusion-of-aid for NAC 12.1 since the enterprise considers that standalone NAC solutions are no longer mandatory.

They’re now not crucial as a trustworthy deal as they was because of the undeniable fact that most network hardware providers hold built-in access ply know-how into their gadgets. The enlarge of the convey-your- personal-gadget (BYOD) vogue has likewise been an element in the decision.

Symantec says the discontinuation of NAC will unlock positive materials, enabling the enterprise to focal point greater on its endpoint providing.

March three marked the birth of confined aid for the aforementioned products. The remaining day on which the solutions can be ordered is September three, 2014.

restricted uphold ends on November 5, 2017. this is the date except which technical assist and content material updates might be purchasable for shoppers with basic protection hearten or yardstick assist. The volume and frequency of those updates will reduce over time.

Symantec Corp announced unusual improvements and enhancements to its endpoint security portfolio designed to refuge towards essentially the most sophisticated cyber assaults via superior endpoint coverage and hardening capabilities. These unusual choices will uphold purchasers in the reduction of the endpoint assault floor by means of permitting simplest confidential decent functions to run, enhancing utility discovery and possibility evaluation, and preventing stealthy assaults.

traditional endpoint protection is positive at stopping malware, but sophisticated attackers are more and more taking expertise of the complexity of endpoint environments, exploiting gaps to determine unusual paths to lucrative goals.

To tackle these challenges, Symantec included advanced insurance policy and hardening into its market-main endpoint safety solution which supplies a coordinated, adaptive endpoint defence it is basic for safety groups to manage. This defence framework reduces the assault surface and can provide insurance policy from unauthorised access, favourite vulnerabilities, zero-day attacks, and everything in between. Symantec can provide these applied sciences through a sole agent which is managed via an integrated cloud console, reducing deployment and administration complexity.

Symantec Endpoint software Isolation allows users to down load and utilize any application safely via guaranteeing every software is limited to secure and approved behaviour. via better visibility and intelligence, suspicious purposes may likewise be remoted to uphold away from any privileged operations that may damage the endpoint. application isolation will additionally guard customary respectable functions from tampering to cease attackers from exploiting information vulnerabilities.

Symantec Endpoint Cloud connect defense grants dynamic insurance policy with the aid of assuring network integrity via a coverage-primarily based sensible VPN to protect against perilous Wi-Fi and service networks. This technology provides an extra layer of insurance policy for home windows 10 instruments.

Symantec Endpoint threat defense for lively directory helps ensure that malicious actors on area-linked endpoints cannot exploit lively listing to profit access to crucial property. haphazard protection for ad restricts post-take advantage of incursions by using fighting credential theft and lateral circulate with a several amalgam of AI, obfuscation and superior forensics methodologies to involve these attacks automatically, in real-time. This unusual product follows the Javelin Networks acquisition and is another instance of Symantec’s competence to without detain incorporate obtained applied sciences into its comprehensive portfolio.

These advanced endpoint coverage and hardening capabilities will additional prolong Symantec’s endpoint security management, which has been known by route of industry analysts.

These improvements are instantly obtainable for buy as add-ons to Symantec Endpoint coverage or as piece of recent suites designed for convenient consumption.

click on Deccan Chronicle technology and Science for the latest tidings and experiences. comply with us on fb, Twitter.

...

While it is very hard job to elect reliable certification questions / answers resources with respect to review, reputation and validity because people acquire ripoff due to choosing wrong service. Killexams.com acquire it certain to serve its clients best to its resources with respect to exam dumps update and validity. Most of other's ripoff report complaint clients approach to us for the brain dumps and pass their exams happily and easily. They never compromise on their review, reputation and character because killexams review, killexams reputation and killexams client assurance is valuable to us. Specially they win care of killexams.com review, killexams.com reputation, killexams.com ripoff report complaint, killexams.com trust, killexams.com validity, killexams.com report and killexams.com scam. If you discern any fallacious report posted by their competitors with the name killexams ripoff report complaint internet, killexams.com ripoff report, killexams.com scam, killexams.com complaint or something infatuation this, just uphold in intellect that there are always nasty people damaging reputation of trustworthy services due to their benefits. There are thousands of satisfied customers that pass their exams using killexams.com brain dumps, killexams PDF questions, killexams rehearse questions, killexams exam simulator. Visit Killexams.com, their sample questions and sample brain dumps, their exam simulator and you will definitely know that killexams.com is the best brain dumps site.

Once you memorize these ST0-050 , you will acquire 100% marks.At killexams.com, they convey completely tested Symantec ST0-050 actual Questions and Answers that are of late required for Passing ST0-050 exam. They beyond question empower people to prepare to prep the and guarantee. It is a superb choice to accelerate your situation as a specialist inside the Industry.

We hold Tested and Approved ST0-050 Exams. killexams.com provides the most accurate and latest IT exam materials which almost accommodate complete information points. With the aid of their ST0-050 study materials, you dont necessity to fritter your time on reading bulk of reference books and just necessity to expend 10-20 hours to master their ST0-050 true questions and answers. And they provide you with PDF Version & Software Version exam questions and answers. For Software Version materials, Its offered to give the candidates simulate the Symantec ST0-050 exam in a true environment.
killexams.com Huge Discount Coupons and Promo Codes are as under;
WC2017 : 60% Discount Coupon for complete exams on website
PROF17 : 10% Discount Coupon for Orders greater than $69
DEAL17 : 15% Discount Coupon for Orders greater than $99
DECSPECIAL : 10% Special Discount Coupon for complete Orders
Click http://killexams.com/pass4sure/exam-detail/ST0-050

killexams.com allows millions of candidates pass the tests and acquire their certifications. They hold thousands of a hit opinions. Their dumps are reliable, less expensive, up to date and of really best first-class to triumph over the problems of any IT certifications. killexams.com exam dumps are modern day up to date in particularly outclass manner on average basis and material is released periodically. Latest killexams.com dumps are available in testing centers with whom they are retaining their dating to acquire ultra-modern cloth.

killexams.com Symantec Certification solemnize courses are setup by route of IT experts. Lots of college students were complaining that there are too many questions in such a lot of rehearse tests and witness at courses, and they're simply worn-out to hold enough money any extra. Seeing killexams.com specialists training session this complete version even as nevertheless guarantee that complete the information is blanketed after abysmal research and evaluation. Everything is to acquire convenience for candidates on their street to certification.

We hold Tested and Approved ST0-050 Exams. killexams.com affords the most rectify and brand unusual IT exam materials which almost comprise complete expertise points. With the useful resource of their ST0-050 exam materials, you dont want to fritter it late on analyzing bulk of reference books and simply want to expend 10-20 hours to grasp their ST0-050 true questions and answers. And they present you with PDF Version & Software Version exam questions and answers. For Software Version materials, Its supplied to provide the applicants simulate the Symantec ST0-050 exam in a true surroundings.

We present free replace. Within validity period, if ST0-050 exam materials which you hold bought updated, they will inform you by email to download recent version of . If you dont pass your Symantec Symantec Network Access Control 11 (STS) exam, They will provide you with complete refund. You necessity to ship the scanned reproduction of your ST0-050 exam file card to us. After confirming, they will quickly approach up with plenary REFUND.

If you set aside together for the Symantec ST0-050 exam the usage of their testing engine. It is light to succeed for complete certifications inside the first strive. You dont must cope with complete dumps or any free torrent / rapidshare complete stuff. They provide slack demo of each IT Certification Dumps. You can test out the interface, question character and value of their rehearse assessments earlier than you settle to shop for.

Industrial Cybersecurity is designed to protect industrial environments from cyber threats at complete stages. Industrial cybersecurity is a highly growing and dynamic zone of concern. It includes industrial control systems, the software and hardware solutions, and network security. These cyber security solutions are designed for the secured operation of machines and plants in industries. Increasing adoption of cloud security solutions; growing adoption of IoT in industrial control systems; rising number of cyber-crime related incidents in different finish utilize industries.

Request a sample of this premium report at:https://www.marketstudyreport.com/request-a-sample/1463079/

On the basis of type, the network security held the largest partake of the market in 2017. The growth of this market can be attributed to the increasing number of web-based applications and the rising security breaches targeting industrial infrastructure and plant operations, wherein hackers try to gain access to sensitive data.

Of complete the major end-user industries, the power industry held the largest partake of the industrial cybersecurity market in 2017. Technological advancements are being carried out in the power industry to enlarge the production efficiency. The increasing dependence on technologies is making the power sector more recumbent to cyber threats. These advancements would significantly enlarge the require for industrial cybersecurity solutions. Industry players are developing various products for the security of the industrial sector.

The competitive landscape of the Industrial Cybersecurity market profiles the key players participating in the global traffic space. These involve as IBM, Honeywell, ABB, Cisco, Schneider Electric, McAfee, Siemens, Dell, Symantec, Rockwell, Kaspersky Lab and Startup Ecosystem. The report likewise details the market positioning, strategies, and revenue procured by each of these manufacturers.

The industry is analyzed in terms of products, applications, regions, and the key manufacturers holding a prominent partake of the global revenue.

The product landscape of the Industrial Cybersecurity market comprises as Network Security, Application Security, Endpoint Security, Wireless Security, Cloud Security and Others. Each product has been analyzed in terms of its production, capacity, and consumption. The report further details the market partake to be procured by each of these products over the coming years.

In terms of end-user or applications, the report is segmented into Power, Energy & Utilities, Transportation Systems, Chemical and Manufacturing and Others. A particular analysis of the contribution of these application segments to the overall market revenue and volume has been included in the report.

The regional segmentation of the report includes United States, Europe, China, Japan, Southeast Asia, India, Central & South America. Detailing the consumption and production rate of Industrial Cybersecurity in these regions, the report outlines the growth curve of this industry in terms of market volume and partake over 2018-2025.

Request a discount on yardstick prices of this premium report at:https://www.marketstudyreport.com/check-for-discount/1463079/

For more information on this report at:https://www.marketstudyreport.com/reports/global-industrial-cybersecurity-market-size-status-and-forecast-2019-2025/?utm_source=Marketwatch-SP

Related Report:

United States Industrial Cybersecurity Market Report 2017

In this report, the United States Industrial Cybersecurity market is valued at USD XX million in 2016 and is expected to achieve USD XX million by the finish of 2022, growing at a CAGR of XX% between 2016 and 2022.

About Us:Market study report LLC allows you to manage and control complete corporate research purchases to consolidate billing and vendor management. You can purge duplicate purchases and customize your content and license management.

WSS, a leader in Secure Web Gateways, is a simple-to-use, cloud-delivered network security service that provides protection against advanced threats, provides access control, and safeguards critical traffic information for secure and compliant cloud application and web use. The integration of Fortinet’s industry-leading FortiGate Next-Generation Firewall with Symantec’s WSS will result in the most comprehensive set of cloud-delivered threat prevention capabilities in a sole service offering on the market today.

“As the first step in this technology partnership, they route to deliver best-of-breed security through the combination of enterprise-class advanced firewall controls to Symantec’s industry-leading network security service,” said knack Gilliland, EVP and GM Enterprise Products, Symantec. “Through this partnership, they hope to provide joint customers the power of Symantec’s Integrated Cyber Defense Platform bolstered by Fortinet’s leading NGFW in an integrated solution that’s light to utilize and deploy.”

Additionally, Symantec’s industry-leading endpoint protection solution is planned to be integrated into the Fortinet Security Fabric platform, providing customers with real-time, actionable threat intelligence and automated response for exploit-driven attacks and advanced malware. Interoperability between Fortinet’s SD-WAN technology will likewise be certified to labor with Symantec’s Web Security Service through Symantec’s Technology Integration colleague Program (TIPP). As piece of the collaboration, both companies route to engage in joint go-to-market activities.

“With today’s announcement, two industry leaders are coming together to provide enterprise-class capabilities across cloud, network, and endpoint security,” said John Maddison, SVP of products and solutions, Fortinet. “Upon completion of the integration, Symantec cloud web gateway customers will be able to profit from Fortinet’s enterprise-class advanced firewall controls, and for the first time ever, Fortinet customers will be able to purchase the industry-leading FortiGate Next-Generation Firewall via FWaaS. With the addition of Symantec as a Fortinet Fabric-Ready Partner, Symantec’s endpoint security solution will be validated to seamlessly integrate with the Fortinet Security Fabric platform to provide more consistent and efficacious protection for joint customers.”

Timing and availability

Fully integrated Cloud Firewall Service within WSS is expected to be available in the 1st half of calendar 2019.

Elements of the Fortinet Security Fabric hold been integrated with Symantec Endpoint Protection, and the companies route to explore further integrations.

Read more about this announcement in the Fortinet and the Symantec blogs.

About SymantecSymantec Corporation (SYMC), the world's leading cyber security company, helps organizations, governments and people secure their most valuable data wherever it lives. Organizations across the world witness to Symantec for strategic, integrated solutions to guard against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global community of more than 50 million people and families depend on Symantec's Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world's largest civilian cyber intelligence networks, allowing it to discern and protect against the most advanced threats. For additional information, gladden visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.

About FortinetFortinet (FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding assault surface and the power to win on ever-increasing performance requirements of the borderless network - today and into the future. Only the Fortinet Security Fabric architecture can deliver security features without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 375,000 customers trust Fortinet to protect their businesses. Learn more at https://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs.

Mahendra Ramsinghani is the founder of Secure Octane, a Silicon Valley-based cybersecurity seed fund.
More posts by this contributor

Intel wants to sell its McAfee security business, which was acquired for $7.7 bn in 2010. And Symantec just acquired Blue Coat for $4.7 billion.

As the security market shakes up in more ways than one, who wins, who struggles and who will acquire acquired next?

“The Symantec-BlueCoat transaction is the second largest M&A transaction in history for enterprise security. The security market chessboard is evolving prerogative before us,” said Eric McAlpine, Founder of Momentum Partners, a Silicon Valley based M&A advisory hard with a long list of security deals.

“Symantec has paid handsomely to acquire a major slouch to maintain its position as a leader in the space. While the headline expense was indeed plenary by financial standards, it was the deal structure that was more interesting, with solidarity and uphold by two very smart private equity firms with abysmal sustain investing in security,” McAlpine said.

Intel’s acquisition of McAfee for $7.7 billion in 2010 is the largest security transaction to date. Yet, the sale of Intel’s security traffic would unlikely fetch $7.7 billion today by any measure.

PE funds with an edge in security – Thoma Bravo, Bain Capital and Vista Equity Partners – may well profit as the security chessboard shuffles. Vista Equity Partners just acquired Ping Identity and Blue Coat was a PE playground of sorts. Blue Coat was bought, sold, and bought again by PE firms (and finally sold it again…to Symantec) with each hard making out well with each flip.

Blue Coat Acquirer

Transaction Year

Blue Coat Acquisition Value

Blue Coat Revenues

Multiple of Revenue (EBITDA)

Thoma Bravo

Dec 2011

$1.3 billion

$467.1 million

2.1x (14x)

Bain Capital

Mar 2015

$2.4 billion

$650 million*

3.7x* (N/A)

Symantec

June 2016

$4.7 billion

$755 million

7.8x (21x)

(Source: 451 Research. *Estimated based on multiples)

Bain Capital nearly doubled their entry value in just over a year. While Bain has agreed to roll over $750 million back into the company, they’re now playing with house money. Bain Capital’s timing for market consolidation was spot on and their investment has paid off handsomely. By complete accounts, Symantec has paid a hefty expense to remain relevant. Which begs the question…does ‘yellow’ and ‘blue’ acquire green ($$$) for this tie up?

Symantec’s overall traffic has largely been driven by its Norton AntiVirus consumer security suite, which fetches roughly 50% of its revenues or $1.9 billion annually. But Norton is a shrinking brand in a struggling market as consumers hold flocked to free or freemium offerings by AVG, AVAST, Malwarebytes, etc. The other half of its revenue comes from Symantec’s enterprise security offerings, which primarily consist of endpoint protection and data loss prevention.

With Blue Coat under its belt, Symantec gets a missing and much needed web and cloud security product portfolio. Symantec can now bring an integrated enterprise suite of offerings for web, email, endpoint, cloud, and network security, albeit some of Blue Coat’s products are not as bleeding edge. Blue Coat itself has grown by acquisition and consolidation. The company closed 11 acquisitions for nearly $400 million in total since 2007.

Value = Post money of the last round Revenues + Growth rate + “X”

As the markets soften and consolidations start, acquirers are not looking just at the post-money of the last financing round. “The M&A markets value a combination of market leadership, revenue growth, predictability, and scale,”says McAlpine. “In their research, the correlation of revenue growth to value alone is currently a mere 22%, which is historically low as valuations hold traditionally correlated much higher (70%+) to top line growth. It’s as artful as ever to determine value in the context of M&A as one must admiration a variety of factors beyond just growth.”

Momentum Partners’ research of the Symantec / Blue Coat transaction highlights the value drivers of buyers-sellers and value drivers of security acquisitions.

Who’s Next In Line To be Acquired?When they win a hard witness at the leading security vendors infatuation Cisco, IBM, Microsoft, and HP, each has utilized M&A to a different extent to remain atop the security leader board.

Cisco has spent north of a billion dollars in the past 12 months to augment threat protection and network behavior analysis with the 2015 acquisitions of OpenDNS ($660 million) and Lancope ($453 million) giving Cisco a head start.

Cisco is likewise priming up its security services traffic with acquisitions infatuation Portcullis and Neohapsis. Cisco’s aggressive security M&A stance dates back to 2013 with the $2.7 billion acquisition of Sourcefire at ~11x trailing twelve months revenues making it the 4th largest security transaction (3rd at the time) in history and one of the priciest at its scale.

So what’s next for Cisco? Should Cisco extend from its core networking security roots to the endpoint? Cisco has been rumored to kick the tires on FireEye as hold some others. Other notable endpoint players involve disruptive Cylance, which recently earned its horn and unicorn status raising $100 million, as well as Tanium, CarbonBlack, and Invincea.

Or, will Cisco witness to slouch away from hardware and jump into web gateways? Morgan Stanley and Gartner assess that cloud security will outpace on-prem growth by orders of magnitude. Cloud security is growing at 19% CAGR for the next four years as compared to a 3% CAGR for on-premise solutions.

The top three companies in Gartner’s Magic Quadrant for Secure Web Gateway are Zscaler, Websense (now Forcepoint), and Blue Coat. With two of the three now acquired (Websense was acquired for $1.9 billion by Raytheon in 2015), the scarcity value increases for Zscaler, which is formidable cloud player and a leading M&A target. Symantec was rumored to be mulling an acquisition of Zscaler earlier this year.

Appliance vendors will be relevant for the foreseeable future, but cloud incumbents are increasingly a major threat. Palo Alto Networks leads the Next Gen Firewall (NGFW) market and its growth rate has been very strong, albeit showing signs of deceleration recently. Palo Alto has used M&A as a implement to extend beyond the network with its acquisitions of CirroSecure (cloud) and Cyvera (endpoint). CirroSecure gives it an edge in the crowded Cloud Access Security Brokers (CASB) space, while independents SkyHigh Networks and Netskope are fighting to gain a bigger slice of the CASB pie. Two other notable CASB vendors were acquired last year (Elastica acquired by BlueCoat for $280 million and Adallom acquired by MSFT for $290 million) giving each an early exit and immense payday to their founders and investors.

A unusual emerging security category known as User & Entity behavior Analytics (UEBA) is tackling the insider threat problem (think Snowden) as well as anomalous network and endpoint behavior previously undetected by existing security solutions. Founders and VCs hold taken notice launching and funding a wave of start-ups infatuation Fortscale, Exabeam, RedOwl, and Securonix poised to win advantage of this rapidly expanding segment within security. Gartner predicts M&A fever for UEBA vendors in 2016 after the dumbfound acquisition of Caspida by Splunk ($190 million) last year.

Tying this back to the endpoint, the endpoint is poised to become contextual with identities, applications and user behavior patterns, which will drive consolidation within the endpoint, application and security analytics vendors. The larger companies infatuation IBM, Intel, Dell+EMC, HP, and CA will hold to augment their portfolios with the innovators to stay relevant as technology takes leaps forward.

Identity Makes A Comeback.

Identity and Access Management (IAM) has witnessed the likes of Okta, SailPoint, Thycotic, and Auth0 making waves in this segment, including Ping Identity acquisition by Vista Equity. But what does Identity even spell in this day and age? And who cares? Compliance has been a driver for IAM adoption yet they are being pushed to deliver more. sole sign On (SSO) and physical Two-Factor tokens conclude not necessarily gash it anymore.

Social identities derived from Google and Facebook are increasing the necessity for more comprehensive next-gen solutions. Adaptive IAM and role-based access control is rapidly growing although economic value remains a challenge. With EU data residency rules coming into effect, they will discern more opportunities arise. Key Management will be integral offerings at the infrastructure layer. Access control to applications and services in dynamic environments is an opening that has yet to be tapped in a meaningful manner. Okta has reportedly hired Goldman Sachs to prepare for an IPO. Will they elect the Blue Coat route and sell instead?

Automate and Orchestrate, Or Else.

The growth of point solutions, integration / policy challenges and shortage of talent will drive the necessity for automation tools. By 2019 there will be a necessity for 6 million security professionals predicts (ISC)2, but only 4.5 million will hold the necessary qualifications for those jobs. Earlier this year FireEye was first to drag the M&A trigger and acquired Invotas, which has become their orchestration hub to aid with security team fatigue. Several other startups are rapidly building automation / AI offerings.

Below is a witness at some of the major security segments and their incumbents who must stay relevant through product evolution and/or M&A. Meanwhile the innovators are looking to disrupt them rapidly.

As the next wave of security innovations occur, they will discern underlying trends of abysmal learning & automation integral to the bleeding edge products. Cloud security, data security and VM / microservices security are growing categories in and of themselves, and beneath it all, and DevSecOps is a unusual thing already.

These newer segments will create unusual opportunities, which in rotate will bring unusual attention by unusual and traditional acquirers alike. Cloud / data seat providers infatuation AWS and Microsoft will build out their portfolio as the market grows. The Telcos are pushing for a slice of this pie. SingTel’s $800 million Trustwave acquisition is indicative of this trend as was NTT’s acquisition of Solutionary. And while defense contractors hold a checkered history in security, they recently hold gotten irritated for the sector including Raytheon (via Websense/Forcepoint), Thales (acquired Vormetric for $400 million) and BAE Systems (acquired SilverSky for $233 million) to build up their security offerings.

And The Winners Will Be…

Cisco clearly is ahead of the pack in this security chess game. Symantec just bought a unusual life line. Or it bought a CEO for $4.7 billion depending on how you witness at it. And Greg Clark is no stranger to acquisitions so it’s expected that Symantec will continue its shopping spree once the dust settles.

In another corner, IBM – the Bigger ‘Blue’ – is beset with its own challenges and moves slowly, but has a cash war chest and its own impressive multi-billion dollar M&A track record in security (ISSX, Q1 Labs, Trusteer). It most recently acquired Resilient Systems to strengthen its Automation & Incident Response capability. Yet the company has some ground to cover. Its Watson AI meme could play out if it can acquire its act together.

Even as Intel gets out of the business, HP and Juniper hold been largely unable to react in any substantial manner. The former undergoing a major corporate transformation and the latter being largely taciturn in security M&A since their acquisition of Netscreen. Juniper acquired Netscreen in 2004 for a whopping $4 billion, making that silent the 3rd largest security deal of complete time.

And then there’s Microsoft who had historically had a terrible record in security under prior CEOs. However, Satya Nadella says no more. Microsoft has committed to expend $1 billion annually on a ‘holistic’ security strategy. This includes acquisitions, hiring unusual execs, building a unusual state of the knack facility, and creating a unusual security group within Microsoft.

Yet the elephant in the elbowroom is clearly Amazon. The ‘AWS effect’ on security is profound and companies infatuation vArmour hold taken advantage. Amazon has built up its own portfolio of basic security tools (such as AWS WAF, CloudHSM, Cloudwatch and IAM) largely through partnerships and in parallel created an AWS security marketplace of over 200 security vendors.

It’s a brilliant play. Amazon will win no matter how the vendors thrive, survive or crash and burn. Other companies infatuation Intel may divest, some will overpay, acquire, integrate, and disintegrate while AWS will laugh its route to the bank. In this $75 billion market growing to $170 billion by 2020, the winner’s coterie will expand beyond just PE firms.

(The author gratefully acknowledges the team at Momentum Partners for providing data and research for this post.)